
Overview

Product video
'Proofpoint People Protection Platform' is an AI-driven solution that protects your people from modern email and cloud-based threats. The solution provides actionable visibility to help you understand your attack surface - who is most attacked, what threats are targeting them, and which suppliers pose the greatest risk. These insights enable you to prioritize risk mitigation controls.
Proofpoint empowers you to effectively protect against multiple threats - phishing, credential theft, ransomware, BEC, cloud account takeover, and compromised supplier accounts. By stopping more email security threats before they enter your organization, security teams have fewer incidents to manually triage and manage. Automated remediation enables consistent, scalable incident response to sophisticated email attacks - thereby increasing the operational effectiveness of your security teams.
'Proofpoint Information Protection Platform' prevents data loss and insider threats posed by careless, compromised and malicious employees by providing contextualized insights into content, behavior, and threats from a single cloud-native console, saving time and operational costs. As a result, organizations can defend their data, minimize financial risk and achieve operational efficiencies.
With Proofpoint, organizations can correlate user activity and threat insights with data movement to prevent and respond to data loss incidents and insider threats in real time. Security teams can gain a holistic view of user interaction across cloud, email, endpoint, and web in a centralized dashboard. Proofpoint protects user privacy by anonymizing user data, masking content snippets and managing regional data residency.
Learn more about Proofpoint packages: https://www.proofpoint.com/us/products/packages
For pricing plans above 500 users, please reach out to: aws-sales@proofpoint.com
We recommend purchasing Proofpoint solutions via Private Offers. Please contact us at: <www.proofpoint.com/awsmarketplace >
Highlights
- Unparalleled Efficacy & Visibility - Detect more threats more accurately; Know who is being attacked and how.
- Unified Context - Gain context between data, behavior and threats. Understand user interaction across cloud, email, endpoint, and web.
- Operational Efficiency - Reduce your team's workload; Streamline investigations while maintaining user privacy.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Security credentials achieved
(1)

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
People Protection | 500 users: Core (P0) email security package | $96,000.00 |
Information Protection | 500 users: DLP Transform (incl. endpoint DLP, cloud DLP, SaaS isolation, ITM) | $176,000.00 |
Vendor refund policy
All orders are non-cancellable and all fees and other amounts that you pay are non-refundable. If you have purchased a multi-year subscription, you agree to pay the annual fees due for each year of the multi-year subscription term.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
Pre-sales email support is offered Monday-Friday during normal business hours (aws-sales@proofpoint.com ) EMEA: +44 141 471 9131 | APAC: +61 1800 450 452 | US: +1 408 752 5432
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

FedRAMP
GDPR
HIPAA
ISO/IEC 27001
PCI DSS
SOC 2 Type 2
Standard contract
Customer reviews
Intelligent data policies have stopped insider threats and protect sensitive emails and USB copies
What is our primary use case?
Proofpoint Enterprise DLP depends upon an organization and what kind of organization it is. For example, if you are working for the healthcare industry, the intellectual property, confidential information, or PII includes health records numbers, personal details, account numbers, passport details, and social security numbers. When you take the service of Proofpoint Enterprise DLP , we first identify what our requirement is. If I was working for one of the banking solutions in Australia, their social security number is definitely there, as well as their passport. It depends upon the location. For the India location, we have the UID and Aadhaar identification. For Australia in the healthcare industry, they have HIPAA (Health Insurance Portability and Accountability Act), claim records, claim details, medical record numbers (MRN), and tax details numbers. All these things are required to protect.
When anyone is trying to send all this information outside, Proofpoint Enterprise DLP provides the solution. We have created rules using Proofpoint Enterprise DLP so that whenever any user is trying to send any emails externally, we capture the keyword from the email body. The system will scan the email, and if that keyword is identified within the DLP solution with the rules we have incorporated, it will generate an alert. The email will be moved to the DLP quarantine folder. A user will receive an automated email or response stating that they are trying to send confidential information outside of the organization, and this has been blocked due to DLP policy. An analyst will create a ticket into our solution, and then the analyst will review that incident and start investigating.
Let's say you're working for the electronics industry, and they have taken Proofpoint Enterprise DLP. For any electronics industry, they work in a situation where they want to protect the circuit design of any one of the latest or newly launched electrical or electronic devices. That electrical circuit design is a patent for them. They don't want to send this to an outside organization. The email will be scanned for the circuit design and patent information. If, for example, there is a project manager who wants to send one of the electronic circuit designs using VLSI technology and has worked for ten years in the organization and is now leaving, they want to send that patent information since they have created it, they will try to send it outside of the organization. In that case, the system will capture the alert, create an alert for that, and then the investigation starts.
Let's say there is a user who has recently resigned from the organization due to some conflict or issues. Now they want to send important intellectual property, intellectual documents, or confidential information outside of the organization. In that case, Proofpoint Enterprise DLP works in the backend, triggers an alert, and starts the investigation.
What is most valuable?
Proofpoint Enterprise DLP is a unified solution that does not work for inbound email but only works for outbound email. It can protect everything by scanning for the email and searching for specific criteria. If that criteria is matched, it can create an alert and take actions accordingly. It's easy to perform all those activities on Proofpoint Enterprise DLP.
Data loss prevention is very easy if you take the service from Proofpoint Enterprise DLP. Proofpoint Enterprise DLP works in the direction of what an organization wants to protect. It's easy to create rules and email firewall rules for outbound emails. While creating that rule, we can easily capture that and protect that. We can protect the important information from going outside the organization. It's very easy to identify all those things.
Proofpoint Enterprise DLP is already an AI-based solution that has taken features from AI from the backend for identifying, investigation, or correlations of all the solutions. The AI and machine learning work in the backend to identify these things.
One thing to highlight is that when a user is trying to send emails, rather than sending the data through email, if they insert a USB drive and start copying files within that USB drive, irrespective of the email communication, Proofpoint Enterprise DLP can also trigger an alert for that, indicating that a USB device was inserted for that specific host. That can be one of the best features for Proofpoint Enterprise DLP.
What needs improvement?
From a DLP product improvement point of view, I think if Proofpoint Enterprise DLP can provide a deep-dive investigation or user activity listed on the alert sections with details about what activity was performed by the users at the time of the alert, what checks were performed, whether any rule was created, any SharePoint was accessed, any confidential SharePoint was accessed, or any established connection was performed, this information would be helpful. If that information was also tagged or shown on the ticket, it would be easier to understand more details or investigation approaches and investigation concepts. If that feature can be possible from the vendor side, it will help us for the investigation and as an improvement.
For how long have I used the solution?
I have used this solution for four to six years.
What do I think about the stability of the solution?
The performance stability is very good. We can see the health status every day on Proofpoint Enterprise DLP. Whenever any node is down or whenever any service CPU utilization is high, we can easily review that in the console, the PROOF console, TRAP console, or health status report. It's easy for us to identify any issues.
Which solution did I use previously and why did I switch?
I had worked with Symantec and Symantec Vault for DLP solutions. That was not very good because they don't have customization features. You could only use limited tabs with minimal customization features.
How was the initial setup?
It's easy for the deployment. We can easily configure that email firewall rules and information protection rules.
What about the implementation team?
Creating a policy is not very difficult for us for Proofpoint Enterprise DLP. Sometimes we usually take help from Proofpoint customer or professional support services. They provide guidance on what and how we can create those policies, and that saves time in deployment and configurations. We can easily get help from Proofpoint customer support or professional support, and it would be easy to create the rule logic and the policy deployment.
What was our ROI?
For the DLP, the important thing is that the response time is very quick. The actions taken are immediate. The quarantine time and response time are efficient. When the email is getting quarantined, we can hold that in the quarantine folder for some time, such as for one month. The analyst can review, investigate, and take actions accordingly.
What's my experience with pricing, setup cost, and licensing?
Proofpoint Enterprise DLP is generally a high-pricing solution, so it generally requires additional licenses for the DLP. If you are a regular customer, then you only have the email protection and email firewall, not for the information protection solution. You need to specify and provide the license, and then accordingly you should go ahead with the DLP activities.
Which other solutions did I evaluate?
Other solutions include CrowdStrike, Telstra, Akamai , Microsoft Office 365 , SIEM tools, HP ArcSight, and Azure .
What other advice do I have?
Proofpoint Enterprise DLP works in the synchronization of Proofpoint Production on Demand and Proofpoint IMD, which is the Internal Mail Defense solution. When any user account gets compromised or an attacker gains access to an internal user account, they will pretend to be an insider threat and start moving confidential information outside of the organization. In that case, Proofpoint Enterprise DLP plays a very important role in easily identifying all these activities from the backend, using machine learning and advanced analytics. UEBA , which is User and Entity Behavior Analytics , performs checks on the user's day-to-day activity on the backend side. It examines what is the daily routine timing, what the user is trying to do every day, and how it is different from some specific day. Based on all those things, it correlates, it identifies, and based on machine learning, it becomes very easy for the DLP solution to take decisions. It's a very good solution in terms of preventing or protecting from DLP incidents.
I think organizations should go ahead with Proofpoint Enterprise DLP. Every day they are coming with more advanced features, more scalability, and more upgraded versions. I would rate this solution as an eight out of ten.
Email defenses have reduced phishing impact and save our soc team significant investigation time
What is our primary use case?
Proofpoint Enterprise Data Loss Prevention (DLP) is currently being used in parts. The email protection plan is used, though uncertainty exists about whether an added-on plan for the DLP specifically is included.
When first joined, Proofpoint was in the early phases of deployment and was told it was pretty straightforward, especially with the services they provide, such as white glove service. They respond quickly to questions.
What is most valuable?
The product does a pretty good job filtering out promotional emails and unwanted emails. It effectively filters specific vendors sending out mass mails, not just spam. For important emails, it catches scripts in emails and does a double check on those. Many things noticed over time have been positive, especially the impact on the SOC team, who state that it saves a lot of time and catches phishing attempts early, specifically very custom phishing.
What needs improvement?
Proofpoint Enterprise Data Loss Prevention (DLP) should probably add something more into their case management process. There are certain things that Proofpoint lacks regarding case management. When incidents come in, it classifies a specific subcategory of what that incident is and creates a ticket for the SOC team. If they could provide more details on the type of incident filing in case management, that would be helpful. This is a hard ask because it requires some form of backend automation workflow. Many tools are starting to adopt their own automation workflows, which is pretty cool.
Occasional mishaps arise related to users' devices affected by Proofpoint or when Proofpoint isn't logging specific device actions. The insider risk tool has been utilized effectively, which monitors employee actions every ten seconds, but there have been mishaps. Additionally, there are moments when specific servers require updates due to mismatched deployment updates, though this is not considered difficult because endpoint engineering counterparts assist, especially during Proofpoint calls.
For how long have I used the solution?
I have utilized Proofpoint Enterprise Data Loss Prevention (DLP) for approximately five years.
What do I think about the stability of the solution?
There was one instance of instability related to a phishing alarm connected to Outlook. It was not major and nothing caused significant downtime within the systems or applications.
What do I think about the scalability of the solution?
Proofpoint Enterprise Data Loss Prevention (DLP) is pretty scalable. The full scalability phase has not been reached yet, as efforts are being made to formalize processes due to frequent M&As. The aim is to have new companies adhere to the same tools. So far, no issues have been encountered, particularly with the smaller companies acquired.
How are customer service and support?
Technical support was contacted via a ticket and they were pretty responsive. Whenever issues arose, the team reached out and a specific TAM stayed on top of it. Initially, tickets were submitted and emails were sent, and the TAM would respond quickly, involving the right people for the tasks.
The quality of their answers is good. Issues have not really been experienced with this specific vendor regarding their responses. They are technical and provide options that help narrow down solutions.
How would you rate customer service and support?
Positive
How was the initial setup?
For the deployment of Proofpoint Enterprise Data Loss Prevention (DLP), currently about three people are dedicated to the process or to maintenance and weekly TAM calls. The best estimate that can be given is two or three people. One individual has been observed managing one aspect of Proofpoint products on their own, and it seemed feasible to finish within a month.
What was our ROI?
The pricing for Proofpoint Enterprise Data Loss Prevention (DLP) is still good. When renewal occurred with Proofpoint, there were no issues with the stated price. The company works with GuidePoint Security as a VAR, which does a good job. So far, there has been no feeling of it being too expensive, which would lead to switching to another solution. Proofpoint adds value and proves its ROI based on the services they provide. Although Abnormal Security has been pushing, the package that Proofpoint provides is better in the long run, especially since results have been seen in prevention and responses to exercises concerning external files being sent out during various departures.
Which other solutions did I evaluate?
Attempts have been made to use the Netskope DLP policy, but it is bundled with whatever they offer, especially with the POP locations. Some people in the company have also looked into other solutions apart from Proofpoint, such as Abnormal Security. This is the current discussion given the many moving pieces.
What other advice do I have?
The overall review rating for this product is 8 out of 10.